Comp 9 Notes
Comp 9 Notes
Subject: Computer
_______________________ :Name
_______________________ :Class
1
(Chapter 1) - FUNDAMENTALS OF COMPUTER
Computer Science 9th - Short / Detailed Question Answers
2
Computer software is utilized for disease diagnosis. It can aid in examining internal
organs. Advanced computer-based systems assist in examining delicate organs.
Some complex surgeries are performed with the help of computers.
Various types of monitoring equipment medical imaging are a vast field that deals
with the techniques to create images of the human body for medical purposes.
Many of the modern methods of scanning and imaging 1 are largely based on
computer technology.2 Magnetic resonance imaging and tomography employ
computer software.
In the field of medicine, computers allow for faster communication between a
patient and a doctor. Doctors can collaborate better over the Internet. Today, it is
possible to obtain3 expert opinions within seconds by means of the Internet.
Medical practitioners can discuss medical issues in medical forums. They can
exchange images and messages in seconds 4 and derive conclusions speedily. They
can seek advice and share knowledge in a convenient manner over the Internet.
The importance of computers cannot be stressed enough 5 as computer technology
has revolutionized the field of medicine.6
4
● The Fourth Generation of Computers (1971 to Present)
● The Fifth Generation of Computers (Present and Beyond)
MainFeatures:
● Technology Used: Vacuum Tubes
● Size: Very large in size (Mainframe)
● Language: Low-level Machine language (i.e., 1's and 0's)
● Main memory (primary internal storage): Magnetic drums
● External storage: Punched cards
● I/O Device: Punched cards and papers
● Operating system: Batch processing operating system (i.e., human operates
to set system, no proper operating system)
● Use: Scientific and research purpose
● Example: ENIAC, EDVAC, UNIVAC
Q.8: What do you know about the second generation of computers and its
main features?
Ans: Second Generation of Computers (1956 to 1963):
With the introduction of transistors, computers became smaller, faster, cheaper,
and more efficient. Assembly language and a high-level language called FORTRAN
were introduced. Magnetic core was used as the primary internal storage medium.
Punched cards were used for input. Batch processing and Multiprogramming
Operating systems1 were employed. These computers were primarily used for
commercial productions, scientific and engineering analysis, and design. Examples
include IBM 7094 and IBM 1401.
Q.9: Briefly describe the third generation of computers and its main features.
Ans: Third Generation of Computers (1964 to 1971):
The use of Integrated Circuits (ICs) further decreased the size of computers and
increased their speed and efficiency. Less expensive computers were introduced.
High-level programming languages such as Pascal and COBOL were used. 1
Keyboards as input and monitors as output devices eased computer usage. Time-
sharing and Real-time Operating Systems were employed. The use of computers
expanded to database management and automatic industrial control. IBM 360 and
IBM 370 are examples of this generation's computers.
Main Features:
5
● Main memory (internal storage): PROM and DRAM
● External storage: Floppy disk
● I/O Device: Keyboard (input), Monitor (output)
● Operating system: Time-sharing and real-time (Unix operating system)
Main Features:
● Technology Used: Microprocessors
● Size: microcomputer (faster, less expensive, smaller and more reliable)
● Language: More high-level languages like C, C++, Java etc.
● Main memory (internal storage): Semiconductor memories RAM and ROM
(EPROM and SRAM)
● External storage: Magnetic storage
● I/O Device: Monitor (output)
● Operating system: Time-sharing, real-time and distributed operating system,
with development of Graphical User Interfaces (GUIs) (DOS and UNIX)
● Use: in every field of life like space applications, business and art work.
● Example: Apple Macintosh, IBM PC
6
● Operating system: GUI based, Microsoft Windows 95 and onward, Windows
NT.
● Use: In all fields of life. Computers will be capable of self-learning, reasoning,
and generalization.
● Example: laptop, notebook, digital diary, Android, Pocket PC, Palm top,
Humanoid Robots
1. iRobot Roomba 980: This smart home robot utilizes AI to scan rooms, identify
obstacles, and determine efficient cleaning routes. It can adapt to room size
and clean autonomously without human intervention.
2. Sophia: A highly advanced social robot developed in Hong Kong, Sophia can
effectively communicate using natural language and express human-like
emotions through facial expressions.
● AI is also used for Machine Learning. It learns from our daily routines and
suggests us different options. Like Google maps suggest the best ways for our
daily commute.
● AI is vastly used in scientific experiments, healthcare, and space technologies.
7
Q.13: Write down the names of different ways of computer classification.
Ans: Classification of Computers:
Computers can be classified into differentials as shown below.
8
such as aerodynamics, design simulations, processing of geological data, weather
forecasting, and nuclear research.
(b) Mainframe:
Mainframe Computers are powerful multi-user and multi-processor 2 computers.
They can process huge amounts of calculations at very high speeds. Mainframes are
also very expensive and require a lot of technical expertise to be installed and
operated. They are used in banks and many large business organizations where
several users work simultaneously.
(c) Minicomputer:
These are smaller than mainframe computers, but they are more powerful than
microcomputers. Minicomputers usually1 use a multi-user operating system. Multiple
users can use the minicomputers through terminals. Minicomputers may be used as
network servers and internet servers. DEC VAX and IBM AS/400 are good examples
of minicomputers.
(d) Microcomputers:2
Microcomputers are also called Personal Computers (PCs). The use of
microprocessors3 has made computers cheaper, yet faster and more reliable. These
are the smallest computers designed to be used by individuals. 4 PCs can be used for
a variety of tasks like documentation, calculations, illustration, and entertainment.
The power of networks and the internet has also made them more useful. Now
computers are also used for communication and socialization.
9
our routine tasks, office work, businesses, researches and industrial applications to
a new level.
Computers are largely used in every field of life. Manufacturing, ecommerce,
education, medical, banking, communication, entertainments engineering.
agriculture, architecture, business, defense, and sports are highly influenced by
computers.
Computers in Today's World:
21th century is the era of technological revolution. In the past technology was only
used to access and share information. However, with the passage of time, the rapid
change in technology has made it nearly impossible to perform any human activity
without its use. Computers are playing an important part in our daily life. News,
weather updates, travelling information and bookings, money transfer and even taxi
bookings are done with the help of mobile phone apps. Many managerial tasks are
also done by computer software. School, library and hospital management are some
examples. Online shopping is becoming a trend in our society too.
Computers are also providing variety of choices for entertainment like online games
in which players from different parts of the world can participate simultaneously. 3D
graphical software has given a new look to movies in which different comic
characters can act with human actors. Photo, sound and video editor software not
only help artists and singers to produce extraordinary creations but also
inexperienced people can enjoy their productivity with ease of use.
10
reality can be used for the simulation of a real environment for training and
education. It is also used for development of an imagined environment for a game
or interactive story.
11
applications that run on computer. Hardware is the physical parts of the computer
that run programs and applications. Hardware can be seen and touched while
software cannot. Computer hardware is a collection of all the physical parts or
components of a computer.
It includes the computer casing, the CPU or Central Processing Unit, computer
memory, VGA graphics card, sound card, and the motherboard.
System Unit:
A System Unit is the part of a computer that contains the primary devices. The
system unit performs operations and produces results for complex calculations. It
includes the motherboard, CPU, RAM and other components, as well as the case in
which these devices are enclosed.
Motherboard:
The motherboard is the main board which connects different parts of computer. It
includes the following general components: Microprocessor (CPU), Slots, Ports,
Buses, RAM, ROM and other electronic components for example resistors,
capacitors, diodes, transistors, jumpers etc. Just like nervous system it allows
communication between all parts of the computer. We can find CPU, memory slots,
expansion slots and a number of chipsets on motherboard. Motherboards are
made of layered fiberglass. These layers contain copper lines that form the circuitry
by which electrical signals are provided to all parts of computer. Various
components of computer may be attached, detached and upgraded on motherboard
according to need of the user. Motherboards also have connectors called ports.
These ports are used to connect input, output and other peripheral devices.
Microprocessor (CPU):
CPU or microprocessor is the brain of computer. The microprocessor is a chip
containing millions of tiny transistors. These transistors manipulate data.
Microprocessor performs all the calculations necessary to make the computer work.
These calculations are performed at very high speed and accuracy. Microprocessor
is made up of silicon. The microprocessor fetches, decodes, executes and stores all
the instructions given by the user or any other device. The speed of computer
mainly depends upon the speed of microprocessor. A microprocessor that has faster
clock speed (measured in GHz) and more cores and cache work faster.
12
(a) Arithmetic Logic Unit (ALU):
ALU performs all the actual calculations like arithmetic operations and logical
comparisons. Arithmetic operations include addition, subtraction, multiplication and
division while logical comparisons include comparing, selecting and matching of
data.
Microprocessor (CPU), Slots, Ports, Buses, RAM, ROM and other electronic
components for example resistors, capacitors, diodes, transistors, jumpers etc.
13
There are also other input devices. For example, microphones are used to accept
sound input and convert it in digital audio format. Microphones are also used for
voice recognition which can convert voice input into text files. Touch Screen is also
used for input. It accepts input directly on monitor by touching finger or any object
on the screen. Magnetic Ink Character Recognition (MICR) and Magnetic Strip
Reader are also used for input.
They are also called digital light projectors and video projectors.
(c) Speakers:
Speakers give output in form of sound. They are good for people with visual
disabilities or where display is not easy.
(ii) Hard Copy Output Devices:
It is output on paper. It is nonvolatile output that is relatively stable and permanent
form. Hard Copy Output Devices are:
(a) Printers:
They usually give output on paper and can print both text and graphics.
There are two types of printers:
Impact, non-impact
(b) Plotters:
Like printer it gives images on paper but typically used to print large format images
such as maps, construction drawing, advertising hoardings etc.
14
It carries data between the processor, memory unit and other components.
Address Bus:
It carries the address of the data (but not the data). The address bus is used to
specify memory location to be used by micro-process for specific operation.
Q.26: Which monitor will you prefer in your school: CRT or FPD? Why?
Ans: I prefer FPD (Flat Panel Display) because
1. They take up less desk space and their prices continue to drop.
2. FPDs are more susceptible to accidental or deliberate damage
3. FPDs have more lifetime than CRT.
4. FPDs are, on average, brighter than CRTs.
5. An inexpensive FPD may have a better contrast ratio than an excellent CRT
monitor.
6. Those big CRT monitors also produce a lot of heat, which wastes energy.
7. FDPs consume less power and this can lead to a considerable reduction in the
power bill.
15
Q.29: What is the difference between impact and non-impact printers?
16
ROM: ROM is the Read Only Memory. It is permanent memory. ROM is quite small
in capacity. It stores the major setting of computer permanently.
RAM: RAM is Random Access Memory. RAM is volatile means it loses its content as
the power supply is disconnected. This is used to store data and instructions
temporarily.
(ii) Secondary Storage Devices:
Secondary storage devices have a larger storage capacity and can store data
permanently. Users save their data on secondary storage devices. Hard Disk, CD
and DVD, SD Card and USB flash disk are examples of secondary storage devices.
Example: Hard Disc, Secure Digital Card, Pen Drive, DVD, CD,
17
Ans: System Software:
System software is a computer program that coordinates all activities and functions
of a computer. It also controls all the operations of the computer hardware. It
includes operating systems, device driver's utility programs and language
translators.
(i) Operating System:
Operating system is the master control program that manages all the system
resources. It creates an interface between computer system and user. Windows and
Linux are commonly operating systems.
(ii) Device Drivers:
Device drivers are computer programs that control a particular device when it is
connected to a computer. Any hardware that we have in our computer must have a
device driver to communicate with operating system. A device driver is a translator
between the operating system and the hardware device. For many devices,
operating system has drivers pre-installed in them. This gave rise to the concept of
plug and play, where the device would be attached to the computer and the
operating system will instantly recognize it. A non-plug-and-play device would
require you to go through several steps of installing drivers and setting up the
device before it would work.
(iii) Utility Programs:
Utility means being useful. Utility programs are useful computer programs that help
to manage, maintain and control computer resources. Operating systems usually
have pre-installed programs that can serve the purpose, but utility software
provides further functionality. One example of utility program is in antivirus
software. This computer program helps to protect a computer from viruses and
other harmful files.
Hard Disk tools are also part of utility programs. They manage hard disk
drives and other storage devices. This includes utilities to scan the hard disks
for any potential problems. Disk cleaner utility is used to remove any
unnecessary files while disk defragmenter is used to re-organize file on a
hard disk drive to increase performance of disk.
(iv) Language Translators:
Language Translators are used to translate human readable instructions into
machine language. Computer can only understand machine language which is
composed of 0's and I's. The computer languages are used to make computer
programs (software).
Generally, software is written in high-level languages, using natural language
words. Language translator is of three types: assembler, compiler and interpreter.
(a) Assembler:
The assembler translates the program written in assembly language into machine
language instructions for execution.
(b) Compiler:
It translates the entire high-level language program at once into machine language
before it is executed.
(c) Interpreter:
It translates the high-level language program line by line into machine language.
Difference Between System and Application Software
S. Key
System Software Application Software
No
1 Definition System Software is the On the other hand,
type of software which is application software is the
the interface between type of software which runs
application software and as per user request. It runs
system. on the platform provided by
18
system software.
2 Development In general, system While in the case of
Language software is developed in application software, high-
low-level language which level language is used for
is more compatible with their development as they
the system hardware in are developed as specific-
order to interact with it. purpose software.
3 Usage System software is used On the other hand,
for operating computer application software is used
hardware. by users to perform specific
tasks.
4 Installation System software is On the other hand,
installed on the computer application software is
when the operating installed according to the
system is installed. user’s requirements.
5 User As mentioned in the above On the other hand, in
Interaction points, system software application software, the
has less or no user user can interact with it as a
interaction available. user interface is available in
this case.
6 Dependency System software can run On the other hand,
independently. It provides application software can’t
a platform for running run independently. They
application software. can’t run without the
presence of system
software.
7 Example Some examples of system On the other hand, some
software are compiler, examples of application
assembler, debugger, software are word
driver, etc. processor, web browser,
media player, etc.
19
Q.35: Write the use of these storage devices: Hard Disk, USB Flash
Disk, SD Card.
Ans: Uses of Hard Disk:
Desktop computers
Laptop computers
TV and satellite recorders
Servers and mainframes
Portable (external) drives are sometimes used to backup home computers or
transfer large files
20
FUNDAMENTALS OF COMPUTER CHAPTER-1
A. Choose the right answer:
1. The device that converts hard copy into soft copy is:
(a) printer
(b) plotter
(c) scanner
(d) barcode reader
6. A collection of wires connecting the CPU with main memory that is used
to identify particular locations is:
(a) control bus
(b) data bus
(c) address bus
(d) memory bus
21
7. The inexpensive and most commonly used computers are:
(a) super computer
(b) mainframe computer
(c) minicomputer
(d) microcomputer
Entertainment Field:
Computers are also providing variety of choices for entertainment like:
(a) Games:
online games in which players from different parts of the world can participate
simultaneously.
(b) Movies:
3D graphical software has given a new look to movies in which different
comic characters can act with human actors in cartoon movies.
Animated films bring a big change in movies industries.
22
Photo, sound and video editor software not only help artists and singers to produce
extraordinary creations but also inexperienced people can enjoy their productivity
with ease of use.
(c) Music:
Different software is developed to compose and listen music e.g Media player.
(d) Drawings and Paintings:
Paint Brush (R.I.P in 2017), Photoshop and other graphic software are used in
making drawings and paintings.
S. Key
System Software Application Software
No
1 Definition System Software is the On the other hand,
type of software which isapplication software is the
the interface between type of software which runs
application software and as per user request. It runs
system. on the platform provided by
system software.
2 Development In general, system While in the case of
Language software is developed in application software, high-
23
low-level language which level language is used for
is more compatible with their development as they
the system hardware in are developed as specific-
order to interact with it. purpose software.
3 Usage System software is used On the other hand,
for operating computer application software is used
hardware. by users to perform specific
tasks.
4 Installation System software is On the other hand,
installed on the computer application software is
when the operating installed according to the
system is installed. user’s requirements.
5 User As mentioned in the above On the other hand, in
Interaction points, system software application software, the
has less or no user user can interact with it as a
interaction available. user interface is available in
this case.
6 Dependency System software can run On the other hand,
independently. It provides application software can’t
a platform for running run independently. They
application software. can’t run without the
presence of system
software.
7 Example Some examples of system On the other hand, some
software are compiler, examples of application
assembler, debugger, software are word
driver, etc. processor, web browser,
media player, etc.
24
and make more accurate diagnoses. The aim is to not only improve diagnostic
accuracy, but also treatment. Path Al's technology can also identify optimal clinical
trial participants. Path Al has worked with the Bill & Melinda Gates Foundation and
Philips to develop high-volume prognostic test support tools and plans for
sustainable access to their advanced diagnostic services.
(5) Write the use of these storage devices: Hard Disk, USB Flash Disk, SD
Card.
Ans: Uses of Hard Disk:
Desktop computers
Laptop computers
TV and satellite recorders
Servers and mainframes
Uses of SD Card:
SD and microSD memory cards are often used to record and store photos, music,
videos, apps and files. Both card types can store data taken directly from a device
while users are on the go, such as photos or videos of party, increasing their value
because they
(6) Which monitor will you prefer in your school; CRT or FPD? Why?
Ans: I prefer FPD (Flat Panel Display) because
(i) They take up less desk space and their prices continue to drop.
(ii) FPDs are more susceptible to accidental or deliberate damage
(iii) FPDs have more lifetime than CRT.
(iv) FPDs are, on average, brighter than CRTs.
(v) An inexpensive FPD may have a better contrast ratio than an excellent CRT
monitor.
(vi) Those big CRT monitors also produce a lot of heat, which wastes energy.
25
(vii) FDPs consume less power and this can lead to a considerable reduction in the
power bill.
S No A S No B C
26
(i) ALU (d) Perform (i) - (d)
arithmetic and
logical operations
27
(Chapter 2) FUNDAMENTALS OF OPERATING SYSTEM
Computer Science 9th - Short / Detailed Question Answers
Ans: An Operating System (OS) is a software which performs all the basic tasks like
booting the computer, file management, memory management, process
management, and controlling peripheral devices such as hard disk, printer, etc. It
manages computer resources efficiently.
Examples: Most common operating systems are: DOS, Windows, Linux, Android,
Mac OS, and iOS.
(i) Booting:
Operating system manages all the hardware and software resources. This includes
allocation and de-allocation of processor, memory access to shared cache memory
and access to network resources.
28
interprets them and translates them into machine language instructions that the
computer hardware can understand
Memory management module performs the task of allocation and de- allocation of
memory space to programs and data in need of these resources.
An Operating System provides the device driver to facilitate I/O functions involving
I/O devices. These device drivers are software that control I/O devices through their
controllers
Q.3: Define interface and user interface. Describe the types of user
interface.
Ans: Interface:
User Interface:
A User Interface (UI) is the part of operating system, program, or devices that
allows a user to enter and receive information.
There are many types of User Interfaces. Two most common user interfaces are
discussed below:
29
to remember the commands and their syntaxes but it is fast in use because text
mode takes less resources. It was primarily provided to users by computer
terminals on UNIX and personal computers including MS-DOS and Apple DOS.
A GUI provides a user-friendly environment where user can interact with computers
through graphical objects such as menus, icons, buttons and other graphical
objects. It is easy to use as users are supposed to just click on a picture to run
commands without memorizing them. GUI is slower than CLI as graphical mode
takes more memory and resources. Windows and IOS are the example of GUI.
Q.4: Differentiate between CLI and GUI. Write any two benefits of each.
S No CLI GUI
4. CLI is faster than GUI. The speed of GUI is slower than CLI.
11. Does not use any pointing Uses pointing devices for selecting and
devices. choosing items.
12. Spelling mistakes and typing Spelling mistakes and typing errors are
errors are not avoided. avoided.
30
In a Single User Operating System, a single user can access the computer system at
a time. These types of operating systems are commonly used. DOS for PCs and
Windows 98 for PCs are example of single user operating system.
A Multi-user Operating System allows multiple users to access the computer at
same time. The operating system manages the memory and resources among the
various users according to the requirement. Linux and UNIX are the most common
examples, of the multi-user operating system
The task can be from single user or from different users also. The time that each
task gets to execute is called quantum. After this time interval is over OS switches
over to next task.
31
(iv) Real Time Processing Operating System (RT OS):
A Real Time Processing Operating System is a time bound operating system which
has fixed time limit. Processing has to be done within the defined time limit
otherwise system will be failed. Real Time Process System classified into two parts:
Hard Real Time System:
A Hard Real Time System guarantees that critical tasks complete on time, even the
shortest delay or urgency is not acceptable. Here system should meet the deadline.
Missile systems and Air Traffic Control System are best examples of Hard Real Time
System.
Soft Real Time System:
In this time constraint is less strict. The meeting of deadline is not compulsory for
each task, every time. A critical real-time task gets priority over other tasks until it
completes. It does not guarantee that task will be completed in defined time but
before a certain time and according to the priority. Online Transaction System,
Airline Ticket Reservation in which reservation could be delayed but should be done
after checking available seats and completed. before aero plane fight, etc. are the
examples of Soft Real Time System.
Q.6: What is the difference between single user and multi-user OS?
Ans: Difference between Single User and Multi-user OS
32
Complexity Single-User Operating System Multi-User Operating System
is simple. is complex.
Performance Only one task at one time gets Schedules different tasks for
performed. performance at 'any' rate.
Q.7: If you are a manager of a large organization which type of OS, will you
prefer? Justify your answer with any two reasons.
Q8: What is the major difference between Soft Real Time and Hard Real
Time systems?
Ans: Difference between Hard Real Time and Soft Real Time System:
33
Q.9: Write down the major steps for installing MS-Office.
Ans: Major Steps for Installing MS-Office:
To install MS-Office package we need to take following steps.
1. Run the MS-Office setup from USB, DVD or Hard Disk backup.
2. Check the box marked, accept the terms of this agreement
and click on 'Continue'
3. Eriter Product Key
4. Click on Install Now or Customize procedure.
5. Select the package which you want to install. Click on 'Install Now'.
6. Then installation begins.
7. MS Office installer will notify automatically after finishing the installation.
Before installing MS-Office we should make sure that hardware and software meet
with the minimum requirements for the version of MS-Office that we want to install.
The minimum requirements may differ from version to version. (For MS- Office
2013 the minimum requirements are: 1.6 GHz processor, 1 GB RAM, 3 GB hard disk
free space, minimum windows 7 operating system and graphics driver).
Q.10: What will be the minimum configuration for installing Windows 10 OS?
Ans: Minimum Configuration for Installing Windows 10 Operating System:
Operating system is the most essential software and there are many operating
systems available. Windows is the most commonly used operating system which is
developed by Microsoft. Choosing an operating system depends upon the hardware
that we have. To maintain compatibility between hardware and software, the
operating system vendor specifies the minimum hardware requirement. For
installing Windows 10, we will need at least the following configuration.
Component Requirement
Processor 1GHz (or faster)
Memory (RAM) 1GB for 32-bit or 2GB for 64-bit
Storage 32GB hard disk space
Graphics Card DirectX 9 or later with WDDM 1.0 driver
Display 800 x 600 pixel resolution
Q.11: Write down the major steps for installing Windows OS.
Ans. Major Steps for Installing Windows:
1. Insert the Windows Installation DVD/Flash Drive
2. Restart your computer
3. Wait for the first startup screen
4. Press or hold Del or F2 to enter the BIOS screen
5. Locate the Boot order/ Boot sequence
6. Select Boot order/ Boot sequence as per your installation source
a) USB Flash/USB Hard Disk
b) USB CD/DVD ROM
c) Internal CD/DVD ROM
7. Select any option:
a) Upgrade
b) Customize Installation (Advance)
8. Select any drive for installing your operating system
9. Follow the on-screen instructions.
34
Software installation is the process of making programs ready for execution.
Software installation or installer is a computer program that instalis files, such as
applications, drivers, or other software, onto a computer. Software is installed on to
computer by various means. They can be downloaded from the internet. They can
also be installed from an installation CD or DVD or from a USB flash drive.
Improved Accuracy:
Humans make errors, properly implemented automated systems do not. Human
errors are not only inefficient in that they must be corrected and lead to productivity
delays, but they can be costly. For instance, adding too many digits when paying an
employee or vendor. Serinus mistakes can lead to security and compliance issues,
potentially fines and penalties. An office automation system limits human
intervention in the transfer of data, which minimizes the occurrence of errors.
35
Reduced Costs:
By automating complex business processes, organizations don't need to invest as
much into hiring for those tasks. As a result, operational costs are lower, while
productivity and profit margins are significantly higher.
Q.15: List the programs available in Ms. Office and write why each program
to be used?
Ans: Ms. Office contains:
36
FUNDAMENTALS OF OPERATING SYSTEM Chapter-2
A. Choose the right answer:
1. The software which performs all basic tasks is:
(a) Antivirus
(b) Start menu
(c) Operating system
(d) Office automation
37
(a) Batch Processing
(b) Time Sharing
(c) Single User
(d) Real Time
10. The operation system that allows frequent switching from one task to
another is:
(a) Batch Processing
(b) Real Time Processing
(c) Single User
(d) Time Sharing
(2) List the functions of an OS. Write the briefly about any two.
Ans: Functions of Operating System:
Operating system manages every activity of a computer. It is the master control
program that provides an interface for a user to communicate with computer.
System software and application software run operating system as shown in the
given figure. Operating System performs the following functions.
1. Booting
2. Resource Management
3. User Interface
4. Memory Management
38
5. I/O Management
6. File Management
7. Process Management
8. User Management
Booting:
Booting is a process of starting the computer operating system. It checks the
computer resources and makes it ready to perform different tasks.
Resource Management:
Operating system manages all the hardware and software resources. This includes
allocation and de-allocation of processor, memory access to shared cache memory
and access to network resources.
39
5. Data insights and more informed decisions
6. Business process improvement
S. A S No B C
No
40
(Chapter 3) - OFFICE AUTOMATION
Computer Science 9th - Short / Detailed Question Answers
Ans: Word Processing refers to the act of using a computer to create, edit, save and
print documents. Specialized software (known as a Word Processor) is needed. One
example is Microsoft Word, but others include Works Word Processor, Open Office
Writer, Word Perfect and Google Drive Document.
The editing and formatting capabilities are powerful. Text can be inserted, edited,
moved, copied, or deleted. Most word processors have spell-check, grammar-check,
dictionaries, and other writing tools.
Ans: Microsoft Word (MS Word) is a famous word-processing software first released
in the early 1980s by Microsoft. It allows users to type text and manipulate it. MS
Word introduced the concept of WYSIWYG (What You See Is What You Get) by
introducing text formatting and document preview. It has advanced features like
tables, images, advanced formatting, and reviewing, allowing users to customize
their documents. Latest versions come as a part of Microsoft Office Suite. MS Word
is still the most widely used word-processing software.
Q.3: Discuss the Page Layout Tab in MS Word. How many groups does this
tab have? Name them.
The Page Layout Tab allows users to control the look and feel of their document.
Users can set margins, apply themes, control page orientation and size, add
sections and line breaks, display line numbers, and set paragraph indentation and
lines.
The Page Layout tab has five groups of related commands namely:
41
Here is the text from the image:
(i) Themes (ii) Page Setup (iii) Page Background (iv) Paragraph (v) Arrange
(i) Margins (ii) Orientation (iii) Size (iv) Columns (v) Breaks (vi) Line Numbers
(vii) Hyphenation
Q.6: Discuss the Margins and Paper Size options in the Page Setup group.
A margin is the area or space between the main content of a page and the page
edges. This button is used to change the margins of the
entire document or selected section.1
The size button is used to choose the size of the paper for
the current section or entire document.
42
Page orientation or print orientation is the placement of contents on a page. This
button sets the contents of the page or section in portrait (Vertical) or landscape
(Horizontal) layouts.2
This button is used to split the text into two or more vertical columns. As we format
our documents in Word, we may find it better to lay out our text in columns. This is
usually done if we are developing a newsletter or a
magazine layout. The number of columns we use is up
to us. To add columns, we follow these steps:
(v) When we do step (iii) we can select the most common numbers of columns (1,
2, or 3). If you want more columns then these, click the More Columns option in
(vi) In step (iv) and we will see the Columns dialog box
where you can set up to 45 columns.
43
Breaks button is used to insert page, section or column breaks in the document.
When we are working on a multi-page document, there may be times when we want
to have more control over how exactly the text flows. Breaks can be helpful in these
cases. There are many types of breaks to choose from depending on what
1
we need, including page breaks, section breaks, and column breaks.
Q.11: Discuss the Line Numbers and Hyphenation option in Page Setup
group.
This button is used to add line numbers on the left side of each line of the
documents.
For instance, watermark documents will normally display the status of the document
like "confidential", "Draft" among others. It is important to note that watermarks
can be in form of texts or even images like logos, 3 pictures and other things of
value.
This button is used to insert logos, images or text behind the contents of a page.
44
Q.14: Discuss the Page Color and Page Border options in Page Background
group.
This button is used when a user wants to apply a color for the background of the
page.
Indent Left is used to define amount of blank space (in centimeters) used to
separate a paragraph from left margin.
Indent Right is used to define amount of blank space (in centimeters) used to
separate a paragraph from right margin.
Space Before is used to indicate how much space (in points) is added before the
selected paragraph.
Space After is used to indicate how much space (in points) is added after the
selected paragraph.
Q.17: List and define Position and Wrap Text options in Arrange group.
Position is used to place an object (picture or shape) on the page Position wherever
you want.
45
Wrap Text (HOTKEY: ALT+P+T+W):
Text wrapping is used to arrange the text around an object like an image.
Q.19: Discuss the Selection Pane, Align, Group and Rotate options in
Arrange group.
Selection Pane is used to select, show, hide and change the order of objects in the
document.
Align is used to place objects like pictures, shapes, icons, etc. in alignment with
margins, edge, or relative to another object in the document.
Group is used to combine two or more objects together so that can be treated as a
single object.
46
Rotate is used to rotate or flip the selected object.
Choosing Manual Table from the Table of Contents menu will create a template of a
generic table of contents. This table will need to be edited and defined manually by
providing all the headings, sub-headings and page numbers. To extend the table,
simply copy and paste the template lines and edit them to preserve proper
formatting.
The table of contents typically includes only major sections of the document,
through in some cases an expanded table of contents that provides a more detailed
view of a complex document may be desirable.
47
A table of contents is particularly useful when a document is divided into multiple
pages. A table of contents provides links to sections of the same document. Those
sections could be located on the same documents easily.
MS Word 2010 helps in writing letters, applications, CVs, question papers and books
in default language set by Microsoft Windows (that is usually English). MS Word
2010 also supports typing text in various other languages like Urdu and Sindhi. To
be able to write in other languages, the keyboards for those languages have to be
installed in Microsoft Windows. MS Word also supports changing and setting its
default language. To change the default language, go to the File menu and select
Options. From the Word Options dialog box, select Language tab. Now choose one
of the available languages as the default Language for MS Word 2010.
Microsoft Excel (MS Excel) is a software that uses spreadsheet system to organize,
display, format and calculate data using advanced features and formulas. MS Excel
is a part of Microsoft Office Suite and integrates with other applications in the Office
Suite. MS Excel offers advanced features to perform calculations, visualize data in
graphs and create pivot tables. It efficiently makes use of spreadsheets to organize,
analyze and store data in tabular and graphical forms. It is the most widely used
spreadsheet system and has a high demand in many organizations for keeping
records of data and presenting them as tables and graphs.
48
5. business accounts and budgeting
6. preparing wages
7. making invoices
8. statistical analysis and reports making.
49
Q.26: How can a user perform calculations in MS Excel?
Ans: Formulas:
MS Excel 2010 allows its user to perform numerous calculations on data. Common
calculations include addition, subtraction, multiplication and division. Comparison of
two numbers and finding their average is also possible. Formulas tell MS Excel what
calculation needs to be performed on the data. Formulas always start with an equal
sign (=). They are defined in the Formula Bar.
To understand this concept, take an example of two numbers, high are 220 and 87,
placed in columns A2 and B2, respectively. The objective is to add these two
numbers using MS Excel formula. To achieve this, follow these steps:
a. Select cell C2.
b. Type (equal sign).
c. Select cell A2 in the worksheet by using the mouse or the keyboard.
This action places the cell reference A2 in the formula of selected cell.
d. Type +
e. Select cell B2 in the worksheet by using the mouse or the keyboard to
put that cell's reference in the formula of selected cell.
f. Press Enter.
g. The answer (307) will be calculated by MS Excel and displayed in the
selected cell (C2) where the addition formula was composed. Likewise
subtraction, multiplication, division and other mathematical functions
can be applied.
Q.27: Write steps that will multiply 37 by 15 using the formula bar in MS
Excel.
Ans: Multiplying 37 by 15 using the formula bar in MS Excel:
a. Type 37 in cell A1.
b. Then, type 15 in cell B1.
c. Then select cell C1.
d. In formula bar, type = (equal sign).
e. In formula bar, after = type A1 B1
f. Press enter.
g. The answer (555) will be calculated by M.S Excel and displayed in the
selected cell (C1).
h.
50
may not succeed in presenting its meaning to the reader whereas visual information
helps better understand those data values at a glance. To understand this concept
take an example of the average monthly temperature for Larkana 2018 as shown
below:
The temperature table contains data in a form which is not very helpful for every
user to understand. If the same data is converted into a graph or chart, the user-
would be better able to reach a conclusion. From the bar chart, we can easily derive
the hottest and the coldest months and compare them with each other.
The same data, if displayed as a graph or chart, will give more meaning and a user
can easily derive an understanding of such values at a glance as seen in the below
figures.
51
OFFICE AUTOMATION CHAPTER-3
A. Choose the right answer:
(a) MS Word
(b) MS Excel
(c) MS PowerPoint
(d) MS Access
(a) MS Word
(b) MS Excel
(c) MS PowerPoint
(d) MS Access
52
4. The special character that initiates the formula mode in a cell is:
(a) /
(b) =
(c) –
(d) *
6. (a) Filtering
(b) Sorting
(c) Organizing
(d) Grouping
(a) Themes
(b) Page layout
(c) Watermark
(d) Margins
9. The correct formula to calculate the total in the given table is:
A B C D E F G
1 Name English Sindhi/Urdu Maths Science Total
2 Khadim 40 41 41 40
3 Wajid 38 33 37 40
4 Adil 44 45 36 39
5 Asad 38 32 33 45
6
(a) =B2 + C2 + D2 + E2
(b) = SUM (B2 TO E2)
(c) =B2 + E2
(d) =SUM (B2 FROM E2)
10. The correct formula to calculate the percentage in the given table is:
A B C D E F
1 Name English Sindhi/Urdu Maths Science Percentage
2 Khadim 40 41 41 40
3 Wajid 38 33 37 40
4 Adil 44 45 36 39
53
5 Asad 38 32 33 45
6
11. HJHJ
12. GHJHGJ
13. GBHGJK
14. HGVUJH
15.
54
Ans: Orientation (HOTKEY: ALT + P+O):
Page orientation or print orientation is the placement of contents on a page. This
button sets the contents of the page or section in portrait (Vertical) or landscape
(Horizontal) layouts.
(6) Differentiate "Bring Forward" and "Send Backward" options in the Arrange group
with example.
Ans: Bring Forward (HOTKEY: ALT + P + A + F):
It brings a selected object in front of all other objects. Send Backward (HOTKEY:
ALT+P+A+E): Send a selected object behind all other objects.
Examples:
55
(7) Explain the "Columns" option in the Page Setup group.
Ans. Column (HOTKEY: ALT+P+J):
This button is used to split the text into two or more vertical columns. As we format
our documents in Word, we may find it better to lay out our text in columns. This is
usually done if we are developing a newsletter or a magazine layout. The number of
columns we use is up to us. To add columns, we follow these steps:
(i) Position the insertion point at the beginning of the material we want to appear in
columns.
(ii) Choose the Page Layout tab on the ribbon.
(iii) In the Page Setup group, click the Columns drop-down list.
(iv) Pick the number of columns we want to use for the selected text.
When we do step (iii) we can select the most common numbers of columns (1, 2, or
3). If you want more columns then these, click the More Columns option in step (iv)
and we will see the Columns dialog box where you can set up to 45 columns.
(8) List and define Position and Wrap Text option in Arrange Group.
Ans: Position (HOTKEY: ALT + P+P+O):
Position is used to place an object (picture or shape) on the page Position wherever
you want.
Wrap Text (HOTKEY: ALT + P+T+W):
Text wrapping is used to arrange the text around an object like an image.
(9) In what way does a ToC help book reader?
Ans: The table of contents serves two purposes:
It gives users an overview of the document's contents and organization.
It allows readers to go directly to a specific section of a document
The table of contents typically includes only major sections of the document,
through in some cases an expanded table of contents that provides a more detailed
view of a complex document may be desirable.
56
A table of contents is particularly useful when a document is divided into multiple
pages. A table of contents provides links to sections of the same document. Those
sections could be located on the same documents easily.
(10) Write steps that will multiply 37 by 15 using the formula bar in MS Excel.
Ans: Multiplying 37 by 15 using the formula bar in MS Excel:
(i) Type 37 in cell A1.
(ii) Then, type 15 in cell B1.
(iii) Then select cell C1.
(iv) In formula bar, type (equal sign).
(v) In formula bar, after type A1 B1
(vi) Press enter.
(vii) The answer (555) will be calculated by M.S Excel and displayed in the selected
cell (C1).
(11) Why do we use Watermark in a document? Give some example of Watermarks.
Ans: Watermark in a document:
A watermark is a faded background image that displays behind the text in a
document. It is simply that image or text that appears mainly behind the main
document. watermarks are normally used to prevent counterfeiting. What water
marking does is to prevent or make it difficult for people to use these documents as
their own. Microsoft Word has some in-built watermarks that can be chosen. For
instance, the in-built watermarks options include draft, confidential and other
functionalities.
For instance, watermark documents will normally display the status of the document
like "confidential", 'Draft" among others. It is important to note that watermarks
can be in form of texts or even images like logo, pictures and other things of value.
Watermark (HOTKEY: ALT + P+P +W):
This button is used to insert logos, images or text behind the contents of adage.
(12) List four uses of spreadsheets in business.
Ans: Common uses of spreadsheets in business are:
(i) storing data
for example: a list of clients, contact information, employee timesheets, sales, and
purchases.
(ii) manipulate and analyze data
(iii) presentation/visualization
(iv) modeling and planning
(v) business accounts and budgeting
(vii) preparing wages
(vi) making invoices
(viii) statistical analysis and reports making.
C. Match the column:
57
Short & Detailed Questions Answers.
Communication:
Data Communication is the process of transferring data electrically from one place
to another. It is the processor exchange of data and information between two
parties such as human and electronic or computing devices.
Data Transmission:
The data transmission means emission of data in any direction via wireless or wired
medium. Transmission may occur between source and destination.
58
Analog signals:
Analog signals are continuously varying signals or waves that change with
time period and are used to represent data. An analog signal can be used to
measure changes in some physical quantities such as light, sound, pressure
or temperature.
Digital Signals:
A digital signal is an electrical signal that is converted into a pattern of bits
to represent a sequence of discrete values, at any given time. It can only be
one of the finite numbers represented as 0 or 1.
Baud Rate:
The baud rate is the number of signals transmitted per second and one
signal can represent one or more bits. It is used to describe the maximum
change in an electronic signal. For example, if a signal changes 1200 times
in one second, it would be measured at 1200 baud.
60
Q 3: Differentiate between Analog & Digital Signals.
Ans: Difference between Analog & Digital Signals:
Q 5: How can we measure bit rate and baud rate? Give an example of each.
Ans: Both bit rate and baud rate are generally used in data communication.
Bit rate is the transmission of a number of bits per second. On the other
hand, Baud rate is defined as the number of signal units per second. The
formulas which relate both bit rate and baud rate is given below:
Bit rate = Baud rate x the number of bit per baud
Baud rate = Bit rate/the number of bits per signal unit
62
Q 6: Explain components of the communication system using simple
examples.
Ans: Components of a Communication System:
A Communication system has the following five components as shown in the
given figure.
i. Message:
It is the information or data to be communicated. Common forms of
information include text, numbers, pictures, audio and video.
ii. Sender:
It is the device that generates and sends a message. It can be a computer,
telephone handset, etc.
iii. Receiver:
It is any particular digital electronic device which has capability to receive
data in the form of a message. The location of the receiving device is
generally different from the sender. Like a sender, it can also be a computer,
telephone handset, etc.
iv. Medium:
It is the channel or path through which the message is carried from sender
to the receiver. Some examples include twisted-pair cable, coaxial cable,
radio waves, etc.
v. Protocol:
Protocols are the rules and procedures on which computers exchange data
on the network. Sender and receiver follow the same protocols to
communicate with each other. In other words, a protocol is an agreement
between two parties or vendors, using communication devices.
64
Example:
When a person talks with another person directly, then the speaker is the
transmitter conveying the information in the form of sound waves through a
communication channel, the intervening air and listener is the receiver. If
the distance between the speaker and the listener is large, sound waves
cannot reach from the speaker to the listener directly and communication is
not possible. Now to make communication possible we have to change the
communication channel and method.
67
a. Unshielded Twisted Pair (UTP):
This type of cable can block interference but it is
vulnerable to external interference. It is mostly used
for telephonic applications. It less expensive
and it is easy to install.
ii. Microwaves:
Microwave transmission is a line of sight transmission i.e. the
sending and receiving antennas need to be properly aligned with
each other. The distance covered by the signal is directly
proportional to the height of the antenna. These are mostly used for
mobile phones are two types of microwave transmissions.
iii. Terrestrial:
Terrestrial microwaves have both stations having antennas on
earth.
iv. Satellite:
In a satellite system some antennas are on satellites in orbit and
others are on stations on earth. They work at remote places so it
can be used in mobile devices.
v. Infrared:
It uses infrared light to transmit Signals. LEDs are used to transmit
signals and light receivers (photodiodes) to receive signals. They
use terahertz frequency. It cannot penetrate walls or other objects.
Infrared light is transmitted generally line on sight (point to point).
Wireless infrared communications can be used to establish short
range wireless links or wireless Local Area Network.
69
70
Q11: What is the difference between radio waves, microwave & infrared
waves?
Ans: Difference between radio wave, microwave & infrared waves:
7 Usage Cost Setup and usage Setup and usage Usage Cost is
Cost is Cost is high. very
moderate. less.
8 Communication These are used These are used in These are not
in long distance long distance used in long
communication. communication. distance
communication.
72
Q12: Describe the different types of flaws and faults in transmission signals.
Ans: Transmission Impairments:
Sometimes, signals traveling through transmission media lose their quality.
This means that the received signal is not the same as the signal that was
sent. This phenomenon is called transmission impairments. Transmission
impairments are those defects that occur when data is transmitted. There
are three causes of impairment i.e. attenuation, distortion and noise.
i. Attenuation:
Attenuation means loss of energy. A signal loses its energy due to
the
resistance of medium while it is transmitted. Its strength decreases
with
increase in distance. Amplifiers are used to overcome attenuation
and make
signal stronger again. It is measured in decibels.
Amplifi
ed
ii. Distortion:
Distortion means change in the shape of the signal. A composite
signal has
several frequencies. When it travels through a medium different
component
of signal may reach at different time at destination because each
component
has a different speed in that medium. This is called distortion. They
have
different phases at sender and receiver ends.
iii. Noise:
Unwanted signal that mixes up with the original signal during the
transmission
The data is called noise. It can be induced noise, crosstalk noise,
thermal noise
and Impulse noise which may damage the signal.
73
Q13: Describe the communication devices and their functions.
Ans: Communication Devices:
A communication device is any type of hardware capable of transmitting and
receiving data, instructions and information.
i. Switch:
A switch or network switch is a networking
device
that connects computers and other devices
like
printers, scanners and cameras on a
network. Data
cables from all computers and other devices of
network are plugged into the switch to enable
communication between them.
ii. Router:
A Router is a device that connects two or
more
networks. Routers are a combination of
hardware
and software. The main function of a router is
to
determine the optimal data path and transfer the
information through that path, also known as network
traffic controller.
iii. Modem:
Modem is short for Modulator and Demodulator. Modulation is the
process of
converting digital signals into analog signals. Demodulation is quite
opposite;
it converts analog signals into digital signals. Modem has the ability
of
sending and receiving signals that allows computers to share
information with
each other. This sharing of information is possible over phone lines,
74
cables or
satellite connections.
a. Dial-up Modem:
Dialup modems use standard telephone
lines to
transmit and receive information. A
dialup
modem can be internal or external. It is
important to remember that telephone
lines
carry only analog signals, whereas data
packets
sent by the computer are in digital form. In order
to send these packets across a telephone line,
modem converts digital signals into analog.
b. DSL Modem:
DSL stands for Digital Subscriber Line. Like
dial-up
modem DSL modem also uses telephone
lines to
transfer digital signals. DSL modem has a
built-in
network switch which enables use of
twisted pair
wires to deliver data and voice at high speed as
compared to dial-up modem. Some DSL modems
also have wireless communication functionality.
c. ISDN Modem:
Integrated Services Digital Network is
a digital
phone connection that can transmit
data, voice
and video over a normal telephone line
at the
same time which was not done before.
It is
faster and expensive technology. Since ISDN
work on digital transmission it converts analog
voice to digital signals before transmission.
75
Network
Interface Card
They are installed on the motherboard.
They
are responsible for establishing a physical
connection between the network and the
computer. Computer data is translated
into
electrical signals and sent to the network
via
Network Interface Cards. Modern
motherboards have built-in NICS.
76
Q16: Describe the types of computer networks.
Ans. Types of Computer Networks:
Computer networks can be categorized by their size as well as their purpose.
The size of a network can be expressed by the geographical area they
occupy and the number of computers that are part of the network. Networks
can cover anything from a handful of devices within a single room to millions
of devices spread across the entire globe. There are three types of computer
network:
i. Local Area Network (LAN)
ii. Wide Area Network (VVAN)
iii. Local Area network (LAN):
iv. Metropolitan Area Network (MAN)
77
• IEEE 802.16 or WiMAX, that provides high-speed broadband
access with
Internet connectivity to customer premises.
78
Ring Topology:
In Ring Topology, computers are connected in a ring or circle shape. The
signal travels around the loop in one direction and passes through each
computer. The recipient of the message receives the message while
another computer acts like a repeater to send it to the next computer.
The failure of a link or a computer can make the entire network non-
functional.
Star Topology:
In a star topology, all the computers are connected to a central device
called hub or switch. To communicate with any computer, the sender
must send information to the hub. Then the hub transmits that
information to the destination. The advantages of star topology are easy
to set up and easy expansion of the network. Another feature of Star
79
topology is that if one link to the hub breaks, only the station using that
link is affected, not the whole network. It requires more cable length than
a bus topology. If the connecting network device (network switch) fails,
nodes attached are disabled and cannot participate in computer network
communication.
Q19: Define standards and network standards. Explain the purpose of the
Standard Organization.
Ans: Standards:
Standards are rules that define the appearance, functionality, or protocols
of some equipment.
Network Standards:
They are essential for network communication. Network standards define
rules of
communications among computing devices. This ensures that companies
(i.e.
Cisco and IBM) that manufacture computing and networking products
follow these
uniform standards. By following standards, all hardware becomes
compatible in the
network, allowing efficient networking to take place.
Standard Organization:
Standard Organization develops, coordinates, revises, amends and
reissues
technical standards. These standards are intended to address the
requirements of
a group of concerned devices. There are several organizations working on
standardization of computing equipment to enable the interoperability
among
80
different devices manufactured by different companies in different
regions. IEEE,
IETF, ITU and ANSI are the examples of standard organizations.
Q20: Write a few lines about different standard organizations.
Ans:
i. International Organization for Standardization (ISO):
It covers a wide range of fields. The ISO has members from the
standards
committees of various governments across the world. It is even
responsible
for developing models which provide high level of system
compatibility,
quality enhancement, improved productivity and reduction in costs.
The ISO
is also responsible for endorsing and coordinating the functions of
the other
standards organizations.
ii. Institute of Electrical and Electronic Engineering (IEEE):
It is an international professional non-profit organization.
Electronics,
computer and communication engineers, researchers, scientists and
students
are the members of IEEE. This organization develops
communication and
information processing standards for all field related to electrically
computer
engineering.
iii. International Engineering Task Force (IETF):
It is a large international community of network designers,
operators, vendors
and researchers concerned with the development of internet
architecture and
smooth operation of the internet.
iv. International Telecommunication Union (ITU):
This organization is a specialized agency that is responsible for
resolving the
issues that concern information and communication technologies.
v. American National Standards Institute (ANSI):
It is the official standards agency for the United States. ANSI is a
completely
81
private, non-profit organization comprised of equipment
manufacturers and
users of data processing equipment and services. It supervises
standards for
products, services, processes, systems and personnel in the United
States.
ANSI membership is comprised of people from professional
societies,
industry associations, governmental and regulatory bodies, and
consumer
goods.
Q21: What is network architecture?
Ans: Network Architecture:
It is the design of a computer network. It is a framework for the
specification of a
network's physical components, their functional organization and
configuration,
operational procedures and communication protocols used. Just like OSI /
TCP
layered architecture.
Q22: Why is the OSI model broken up into layers?
Ans: The OSI model is conceptual. It is broken up into layers so a person
can visualize
network communications from the application to the medium. It works
going up the
stack at the destination as well. Rather than just "all the magic happens",
it is
broken down so you can visualize the steps a computer takes when it
encapsulates
data.
Breaking things down into layers also allows for better troubleshooting. If
there is
no data being received on my NIC, then we can assume it is a layer 1 or
2 problem.
If we are getting routing errors, then we most likely have a layer 3
problem. It allows
an administrator to better pinpoint an issue.
82
Q23: Describe ISO's OSI Model.
Ans: ISO's OSI Model:
The Open Systems Interconnection model is a conceptual model
developed by ISO. It characterizes and standardizes the communication
function of a telecommunication and computing network. Its goal is the
interoperability of different communication systems with standard
communication protocols. This model divides a communication system
into seven abstraction layers.
83
addresses (IP addresses) to
physical addresses (MAC
addresses).
4 Transport It ensures the reliable
transmission of data. Transport
layer manages error control, flow
control and quality of the
service. If the data is not
properly transmitted it requests
to resend.
84
Q24: Describe TCP/IP Model.
Ans: TCP/IP Model:
practicalcentre.blogspot.com
TCP/IP is a suite of communication protocols used to interconnect network
devices
on the internet. These are a set of rules and procedures. TCP/IP specifies
how data is
exchanged over the internet by providing end-to-end communications. It
also
identifies how data should be broken into packets, addressed, transmitted,
routed
and received it at the destination. With reference to OSI layers, we can
understand
the functions of TCP/IP layers.
85
Q26: Differentiate between Physical and Logical Addresses.
Ans: Difference between Physical Address and Logical Address:
86
device.
IP version 4 (IPV4) addresses are comprised of four number segments
separated
by dots. Example of an IP address is 192.168.108.105.
87
DATA COMMUNICATION & COMPUTER NETWORKS CHAPTER# 04
88
(c) Cheapest
(d) Optimal ✔
8. Converting digital signal to analog called:
(a) Modulation ✔
(b) Modification
(c) Bandwidth
(d) Multiplexing
9. The number of bits used in an IPV 4 address are:
(a) 16
(b) 32 ✔
(c) 64
(d) 128
10. The loss of energy in transmission signal refers to:
(a) Attenuation ✔
(b) Distortion
(c) Noise
(d) Jitter
89
B. Respond the Following:
i. List the properties of a good communication system. Explain any
one.
Ans: Properties of a Good Communication System:
The effectiveness of a data communications system depends on the
fundamental characteristics which include delivery, accuracy and
timeliness.
i. Delivery:
Making sure that the data is delivered is the first fundamental
characteristic of any communication network. The system must be
able to deliver data in the correct order to the correct destination.
ii. Accuracy:
The system must deliver the data accurately. Data that has been
altered during transmission and left uncorrected is not useful.
iii. Timeliness:
The data must be delivered in a timely manner. Late delivered data
is useless.
ii. Explain components of communication using a single example.
Ans: Components of a Communication System:
A Communication system has the following five components as
shown in the given figure.
i. Message:
It is the information or data to be communicated. Common
forms of information include text, numbers, pictures, audio
and video.
ii. Sender:
It is the device that generates and sends a message. It
can be a computer, telephone handset, etc.
iii. Receiver:
It is any particular digital electronic device which has
capability to receive data in the form of a message. The
90
location of the receiving computer is generally different
from the sending computer. Like sender, it can also be a
computer, telephone handset, etc.
iv. Medium:
It is the channel or path through which the message is
carried from sender to
the receiver. Some examples include twisted-pair cable,
coaxial cable, radio waves, etc.
v. Protocol:
Protocols are the rules and procedures on which computers
exchange data on the network. Sender and receiver follow
the same protocols to communicate with each other. In
other words, a protocol is an agreement between two
parties or vendors, using communication devices.
Example:
When a person talks with another person directly, then the
speaker is the
transmitter conveying the information in the form of sound
waves through a communication channel, the intervening
air and listener is the receiver. If the distance between the
speaker and the listener is large, sound waves cannot
reach from the speaker to the listener directly and
communication is not possible. Now to make
communication possible we have to change the
communication channel and method.
91
the information through that path, also known as network traffic
controller.
Hub:
In a star topology, all the computers are connected to a central
device called hub or switch. To communicate with any computer,
the sender must send information to the hub. Then the hub
transmits that information to the destination.
Amplifi
ed
92
2 Penetration At low frequency, At low frequency,
they can penetrate they can penetrate
through solid through solid objects
objects & walls & walls. At high
but high frequency frequency, they
they bounce off cannot penetrate.
the
obstacle.
3 Frequency Frequency range: Frequency range:
Range 3KHz to 1GHz. 1 GHz to 300 GHz.
93
1 or 2 problem.
If we are getting routing errors, then we most likely have a layer 3
problem. It allows
an administrator to better pinpoint an issue.
vii. Explain the purpose of the Standard Organization.
Ans: Standard Organization develops, coordinates, revises, amends
and reissues
technical standards. These standards are intended to address the
requirements of
a group of concerned devices.
There are several organizations working on standardization of
computing
equipment to enable the interoperability among different devices
manufactured by
different companies in different regions.
Example: ISO, IEEE, IETF, ITU and ANSI are the examples of
standard
organizations.
viii. List one merit and one demerit of each topology.
Ans:
i. BUS TOPOLOGY:
Advantage or Merit of Bus Topology:
• Simplicity
• Cable required is least compared to other network topology.
• Used in small networks.
• It is cost effective i.e. low cost.
• It is easy to understand.
• Easy expansion of the network i.e. easy to expand joining
two cables
together.
Disadvantage or Demerit of Bus Topology:
• A breakdown in the bus cable brings the entire network
down.
• If network traffic is heavy or nodes are more the
performance of the
network decreases.
• Cable has a limited length.
• It is slower than the ring topology.
ii. RING TOPOLOGY:
Advantage or Merit of Ring Topology:
• Transmitting network is not affected by high traffic or by
94
adding more
nodes, as only the nodes having tokens can transmit data.
• Cheap to install and expand.
Disadvantage or Demerit of Ring Topology:
• The failure of a link or a computer can make the entire
network
nonfunctional.
• Troubleshooting is difficult in ring topology.
• Adding or deleting the computers disturbs the network
activity.
iii. STAR TOPOLOGY:
Advantage or Merit of Star Topology:
• The advantages of star topology are easy to set up and easy
expansion of
the network.
• Another feature of Star Topology is that if one link to the
hub breaks, only
The station using that link is affected, not the whole network.
• Fast performance with few nodes and low network traffic.
• Hubs can be upgraded easily.
• Easy to troubleshoot.
Disadvantages or Demerits of Star Topology:
• Cost of installation is high.
• Expensive to use.
• If the hub fails then the whole network is stopped because
all the nodes
depend on the hub.
• Performance is based on the hub, that is, it depends on its
capacity.
(Note: Write down only one merit and one demerit for each
topology as asked in
question)
95
• Telephone networks providing high speed DSL lines.
Example of Wide Area Network (WAN):
• The Internet is an example of WAN.
x. How can we measure bit rate and baud rate? Give an example of
each.
Ans. Both bit rate and baud rate are generally used in data
communication.
Bit rate: is the transmission of number of bits per unit of time
(second). Bit rate can
be ranging from bps (bits per second) for smaller values to kbps
(kilobits per
second) and mbps (megabits per second).
For Example:
DSL connection may be able to download data at 10 kbps, means
10,000 bits are
transferred within one second.
Baud rate: is defined as the number of signal units transmitted per
unit of time
(second).
For Example:
If a signal changes 1200 times in one second, it would be measured
at 1200 baud.
Formula:
We can measure bit rate and baud rate by the following formula,
which relate both:
Example:
When Bit rate and Baud rate are Same:
Assume 9600 bits are transferred per second and 1 bit used to
represent signal
level i.e either logic 0 or logic 1 then bit rate is 9600 because
number of bits
transferred per second are 9600 and baud rate is 9600 because
number of
changes happening per seconds are also the same.
96
When Bit rate and Baud rate are not same:
If 9600 bits are transferred per second and 2 bits used to represent
the signal level
then bit rate is 9600 because the number of bits transferred per
second are 9600
but baud rate is 4800 because two bits represent signal level.
S.N A S.N B C
o o
97
"Computer security is the protection against theft o r damage to our
computer
hardware, software and information present on them from threat of viruses
or
unauthorized use."
Explanation:
The computer has become an important part of our life. We store important
data on
our computers in the shape of documents, pictures, programs, etc.
Therefore, we
expect that all our information must remain safe and our computer runs
properly
without any problem.
Few threats can cause problems for our computers. These threats may be
different
types of viruses or unauthorized use of a computer. To prevent our
computer from
such threats, we need to abide by computer security.
Q2: Why is computer security important? Write any three reasons.
Ans: Importance of Computer Security:
i. Prevent from viruses and malware:
• Computer security is important for our computer's overall health.
• It keeps our information protected and helps prevent viruses and
malware,
which allows programs to run quicker and smoother.
ii. Secure Private Information:
• It safeguards confidential and sensitive information.
• The advancement in science and technology has changed day to
day
activities. We rely on computers and mobile phones, where we
access a
a lot of information which we do not want to share with others. This
information may include our passwords, banking details, contacts,
pictures, etc. To protect this information we need to make our
devices
secured that no one can damage or access this information without
our
consent.
iii. Provide Safe Environment:
• Computer Security is important as it enables people to perform
98
their work
in safe environments.
• It helps in the execution of essential business processes.
99
Q5: Define malware? And describe different types of malware?
Ans: Malware:
The term malware is the contraction of malicious software.
● Malware is a broad term that encompasses computer viruses,
worms, spyware, adware and others.
● Malware is a program that is written generally to cause a mess.
They can be so
dangerous that they can also damage devices.
● However commonly malware encrypt, steal or delete data, hijack
core functions
of computing and disturbing different activities.
100
malicious
hackers but with the permission of the authorized person for the purpose
of
improving the security and defending the systems from attacks by
malicious users.
Ethical hackers are expected to report all the vulnerabilities and weakness
found
during the process to the management.
Q8: Who is a cracker?
Ans: Crackers:
Crackers are persons who gain unauthorized access to another system. They
bypass passwords or licenses of computer programs, change source code or
intentionally breach computer security. They do it with negative intentions.
Crackers can also make targeted systems unavailable or non-functional.
They commit these activities generally for money but they may do it for
fame or just for challenge or fun.
i. Hacking:
Hacking is perhaps the most common crime in the computer world.
Hackers can steal our WiFi, email or social media accounts
passwords. Hackers also attack a website and take it down.
However, the scope of hacking is much wider. The hackers can also
steal sensitive information from government and business
organizations, make fraudulent transactions and erase data on the
network computers.
ii. Credit and Debit Card Scam:
Keeping debit or credit cards is a common practice but insecure use
of these cards can be dangerous. If a person has information about
our debit or credit card he or she can make fraudulent transactions.
There are various ways to get this information. One way is through
101
scamming. Scammers set small machines inside an ATM or credit
card machine. These machines copy the data which is then misused
by the scammers. Debit and credit cards are also secured with PIN
codes.
iii. Phishing:
Phishing is a method of trying to gather personal information using
false e- mails and websites. In phishing, perpetrators contact the
target person through email, telephone or text message and pose
as a legitimate and trusted individual. He or she asks the target to
provide sensitive data such as personally identifiable information,
banking and credit card details and passwords for different reasons.
The information is then used to access different accounts and can
result in identity theft and financial loss.
iv. Clickjacking:
If we see a video tagged as "OMG? You won't believe what this boy
has done!" or we find a button on a website that asks us to click to
claim a reward we had never applied for? This is a kind of fraud
which is called Clickjacking. Usually, culprits target children or
novice internet users to click on a link containing malware or trick
them into sharing private information via social media sites.
v. Cyber Bullying or Harassment:
Electronic means computer, mobile phone or internet are also used
for online bullying or harassment. Harmful bullying behavior can
include posting rumors, threats, passing inappropriate remarks,
lending personal information, blackmailing and committing hate
speech. The perpetrator does it to cause harm to the victim. Victims
may experience lower self-esteem, intent to commit suicide and a
variety of negative emotional responses, including being scared,
frustrated, angry and depressed.
Q10: Your friend has become a victim of cyber harassment. What two
pieces of advice would you give him or her?
Ans: Pakistan is in the list of the fastest-growing countries that are using
the internet. This opens the doors for the fact that cyber bullying is
increasing as well but yet there is no legislation for cybercrimes in
Pakistan. If my friend becomes the victim of cyber harassment, I will give
him advice that:
102
country. Complaints can be made on these numbers: 021-35662222,
021-35682222.
Q11: What is cyber-attack?
Ans: Cyber Attack:
Cyber-attack occurs when a cyber-criminal uses a computer or any device
to launch attacks to other single or multiple computer networks. The
culprit tries to enter a computer system and network through cracking,
scam links, phishing or any other method. Generally cyber-attacks are
committed for getting any benefit or causing harm to the victim 's
computer, network or websites. A cyber-attack either disables the
targeted computer, deletes information or knocks it offline. It may also
steal information from the computer or network.
Q12: Give two examples of phishing.
Ans: Example 1:
There are targeted and simple forms of phishing emails designed to get
victims to purchase cards, or to give up personal email or phone
numbers. The "email compromise" gets its name because the attacker
mimics the email of a known sender. However, these can also be sent
through a legitimate, albeit hacked account. The messages start out as
basic greetings then progress into requests for money or data. Since the
content is highly personalized it's often easy to get hooked.
Example 2:
There are targeted and simple forms of phishing emails designed to get
victims to interact and establish a rapport. The messages start out as
basic greetings or job opportunities and then progress into requests for
money or data.
Q13: What will you do in case of becoming a victim of computer cyber-
crime?
Ans: The perpetrator of cyber-crime always asks to keep his or her
contact secret
otherwise the victim may face heavy loss. The response of the victim of
cyber-
crime, bullying or harassment is very crucial. There are ways to get rid of
such
miseries. First thing is to report such incidents to the trusted people that
are highly
likely parents and teachers.
The government has also taken measures to curb cyber crimes especially
cyber
bullying and harassment. In Pakistan, the National Response Centre for
Cyber
Crimes has been set up to help the victims of cybercrimes. An online
complaint can
103
be launched through the form available on the website or help may be
sought by
calling helpline 9911 which is available 24/7.
Q14: Define malware.
Ans: Malware:
The term malware is the contraction of malicious software. Malware is a
broad term
that encompasses computer viruses, worms, spyware, awareness and
others. Malware
is a program that is written generally to cause a mess. They can be so
dangerous
that they can also damage devices. However commonly malware encrypt,
steal or
delete data, hijack core functions of computing and disturb different
activities.
Q15: Describe the different types of malware.
Ans: Different Malware:
Types of malware can include computer viruses, worms, adware and
spyware.
i. Computer Virus:
A computer virus is a computer program that can spread across
computers
and networks by making copies of itself, usually without the user's
knowledge.
It can also modify other computer programs, insert its own code
and change
computer settings. Viruses are harmful. They can range from
displaying
irritating messages to make the documents inaccessible or even
delete them.
Viruses generally latch on a host file and when they execute they
infect other
files or programs. Boot Sector, Resident, Macro Viruses and File
Infector are
some examples of viruses.
ii. Worm:
A computer worm spreads copies of itself from computer to
computer. A
a worm can replicate itself without any human interaction. It does
not need to
attach itself to a file or program to cause damage. It can do several
malicious
104
tasks, such as dropping other malware copying itself onto devices
physical
attached to the affected system, deleting files and consuming
internal storage
and memory resources.
iii. Adware:
Adware is advertising-supported software. They present endless ads
and
pop-up windows that could potentially consume memory and
processing
resources. Adware can also change the different settings of internet
browsers
like the homepage and default search engine. Normally, these are
not as
dangerous as other malware.
However, Adware annoys the user and slows down the processing.
The
advertisements produced by adware are sometimes in the form of a
pop-up
or sometimes in little windows that may not be closed. Adware
programs
include games, desktop toolbars or utilities. Commonly, adware is
web-based
and collects web browser data to target advertisements, especially
pop-ups.
iv. Spyware:
Spyware is a malware that monitors a-device and steals important
information
about a person or organization without their consent and sends
such
information to another person or organization. Spyware takes
control over a
mobile phone or computer without the user's knowledge. They
capture
information like web browsing history, email messages, usernames
and
passwords and online payment information. Spyware can come
through
cookies or even when we install software without readings its terms
and
conditions. System monitors, cookies trackers, rootkits and key-
loggers are
a few examples of Spyware.
105
Q16: Describe the ways viruses spread.
Ans: Ways of Viruses Spread:
A computer virus is just like a flu virus. It is designed to spread from one
device to
another device and can replicate itself. Any device that is infected from a
virus can
infect other devices. It means that viruses come from outside. Here are
some ways
how they come:
i. USB Flash Disk and CDs:
USB Flash Disks are the most common media to transfer files.
An infected computer can spread a virus to a clean USB flash
disk that is inserted and likewise, an infected USB can
transmit the virus onto a clean computer. The Auto Run
function in Windows launches installers and other programs
automatically when a flash drive or CD is inserted. This action
can initiate a virus spreading process onto the computer.
Copying infected files from the USB or CD can also infect the
computer.
ii. Internet Downloads:
Computer viruses also spread through files or software
downloads from the Internet. They can be attached to
software or files that we download. The viruses that come
from the internet can also make computers accessible to
hackers. Though, almost every antivirus software provides a
shield against malicious downloads, it is highly recommended
that the software and files must be downloaded from trusted
sources.
iii. Computer Network:
Users must be careful because files picked from a Local Area
Network (LAN) may be infected and cause damage to our
computer or operating system. Some can happen to transfer
files from one mobile device to another Email attachments
have been a popular medium to spread viruses. Viruses can
easily be transferred from one computer to another through
email attachments. The infected email may come from an
unknown or fake email address. Perpetrators who spread
these viruses use either fake email or change a few letters in
a trusted email address. People in our contact list may also
send us infected files as they may not be aware of it
themselves. Users must check the origin of the email before
opening the attached files or clicking any link that is given in
106
the email. Especially spam mails must be checked carefully
before clicking on its attachment.
107
Keeping ourselves safe from malware and viruses is mostly in our
hands. More than 90% of computers are infected due to the user's
mistake. Our computers have caught a virus if they start slowing
down, behave unusually, crash during processes or restart several
times, show annoying messages and some of our documents
disappear or become inaccessible. We must avoid this situation to
be created. Some simple measures can prevent our system from
malware and viruses
● Install anti-virus software and keep it updated.
● Run scheduled scans regularly with any anti-virus software.
● Keep our operating system updated.
● Do not click on internet links which have unusual labels,
images or captions.
● Do not open email attachments or click on hyperlinks from
unknown senders.
● Scan USB flash drive, SD cards and mobile phones before
opening.
● Use spam blocking or filtering tools to block unsolicited
emails, instant messages and pop-ups.
● Only download files and programs from trusted sources on
the Internet.
● Never use an open Wi-Fi.
108
Q21: Describe the types of security mechanisms.
Ans: Types of Security Mechanism:
There are many ways a computer secured system may authenticate
a user. Some of them are:
i. Username and Password:
A username and a password are the pair of keyboards known
by the user. They are presented to the computer to
authenticate the user. Usernames and passwords are the
default authentication mechanism on the web today.
However, recent large scale computer attacks have made
usernames and passwords unacceptable authentication
mechanisms are needed to fully authenticate. Additional.
ii. Personal Identification Number:
PIN stands for Personal identification Number. It is a security
code for verifying our identity. Similar to a password, our PIN
should be kept secret because it allows access to important
services such as financial transactions and confidential emails.
The PIN provides security when a credit/debit card is lost or
stolen because it must be known before making money
withdrawal or transfer.
iii. Biometric Verification:
Unlike authentication processes, biometrics verification
makes sure that the real person gets access to the data or
device. Biometric authentication relies on the unique
biological characteristics of a person. Biometric authentication
systems capture, detain real-time and compare it with
existing data in the database. If both samples of the diametric
data match, authentication is confirmed. Scanning
fingerprints is the most common way of biometric. However,
some other advanced ways include retinal scans and iris,
facial and voice recognition.
Q22: Describe personal ethics in the computer field.
Ans: Personal Ethics in Computer Field:
Professional ethics involve the personal and corporate principles
and rules that guide behaviors within the context of a profession.
The role of a professional code of ethics is to clarify values and
rules and can be used as a framework for discipline.
Computing professionals' actions change the world. To act
responsibly, they should reflect upon the wider impacts of their
work, consistently supporting the public good. Here are some
guiding principles:
● Contribution to society and human well-being, acknowledging
that all people are stakeholders in computing.
● People are stakeholders in computing.
109
● Be honest and trustworthy.
● Respect the equipment.
● Avoid causing any harm.
● Be fired and act not to discriminate, bully or harass.
● Respect the work required to produce new ideas, inventions,
creative works, and computing artifacts.
● Respect privacy and maintain confidentiality.
● Maintain high standards of professional competence conduct
and ethical practice. Create opportunities for other individuals
or groups to grow as professionals.
● Manage personnel and resources to enhance the quality of
work life.
● Ensure that the public good is the central concern during all
professional computing work.
● Assess computing and communication resources only when
authorized.
● Foster public awareness and understanding of computing,
related technologies & their consequences.
110
these rights, no other person or organization can copy or reproduce
any other intellectual property. Intellectual property rights are
acclaimed worldwide. In Pakistan, Intellectual Property Organization
(IPO) regulates the matters regarding intellectual property rights.
111
software industry. It causes a significant loss of revenue for
developers and vendors. Because of piracy, vendors have fewer
resources to devote to research and development of new products.
Since they earn less profit, they are forced to pass these costs on to
their customers. Software companies have tried various techniques
to stop software piracy but most of them have remained
unsuccessful. They applied for copy-protection which demands the
user to enter keys or credentials. Today, most software requires
registration which is mainly online. However, these measures could
not stop software piracy. Using pirated software is also risky for
users. Aside from the legal consequences of using pirated software,
users of pirated software lose some practical benefits as well.
Pirated software may not work properly or stop working at any
time. Furthermore, pirated software users cannot access customer
support, upgrades, technical documentation, training and bug fixes.
112
Computer Security & Ethics CHAPTER#
05
113
(c) Spyware
(d) Trojan
8. The malware that replicates itself and doesn't need to attach with any
files is:
(a) Virus
(b) Adware ✔
(c) Spyware
(d) Worm
9. Through which virus spreads?
(a) Email Attachments
(b) Internet Downloads
(c) Flash Disks and CDs
(d) All of them ✔
10. Chick this link and win a $5 voucher at McDonald's. This is an
example of:
(a) Scam
(b) Phishing
(c) Clickjacking ✔
(d) Hacking
114
B. Respond the Following:
115
passwords, banking details, contacts, pictures, etc. To protect
this information we need to make our devices secure so that
no one can damage or access this information without our
consent.
3. Provide Safe Environment:
● Computer Security is important as it enables people to
perform their work in safe environments.
● It helps in the execution of essential business processes.
116
The information accuracy is the type of measurement that assures the
information is correct and true.
Importance of Information Accuracy:
● Information accuracy is important because inaccurate
information is harmful in different fields like medical history,
Business records, Government data, etc.
● It is necessary that the information should not be generated
from malicious data.
● For information accuracy, the data must be from reputable
sources.
● In the era of information explosion, we need to be more careful
while using or disseminating information. The use of unreliable
sources results in inaccurate information.
● Especially, the accuracy of information shared on social media is
often questionable.
v. Your friend has become a victim of cyber harassment. What two pieces
of advice would you give him or her?
Ans: Pakistan is in the list of the fastest-growing countries that are
using the internet. This opens the doors for the fact that cyber bullying
is increasing as well but yet there is no legislation for cyber-crimes in
Pakistan. If my friend becomes the victim of cyber harassment, I will
give him advice that:
117
i. Report To Trusted People:
First thing is to report such incidents to the trusted people that
are highly likely to be parents and teachers.
ii. Complaint Government Authorities:
Write down an application (in English or in Urdu), describe the
complete problem, as much evidence, details as he/she can and
send it to the FIA National Response Center for Cyber Crimes.
OR send an online complaint through the form available on the
website or by calling helpline 1991 which is available 24/7.
118
● It causes a significant loss of revenue for developers and
vendors.
● Because of piracy, vendors have fewer resources to devote to
research and development of new products.
● Since they earn less profit, they are forced to pass these costs
on to their customers.
● Software companies have tried various techniques to stop
software piracy but most of them have remained unsuccessful.
● They applied for copy-protection which demands the user to
enter certain keys or credentials. Today, most software requires
registration which is mainly online. However, these measures
could not stop software piracy.
119
● Through these rights, intellectual property is protected with the
help of copyrights, patents, and trademarks.
● They allow creators or owners of patents, trademarks or
copyrighted works to benefit from their work or investment.
● Under these rights, no other person or organization can copy or
reproduce any other intellectual property.
● Intellectual property rights are acclaimed worldwide.
● In Pakistan, Intellectual Property Organization (IPO) regulates
the matters regarding intellectual property rights.
120
web browser
data to
target
advertiseme
nts,
especially
pop- ups.
121
networks by by adware reading its
making copies are terms and
of itself, sometimes in conditions.
usually without the form of a System
the user's pop-up or monitors,
knowledge. sometimes in cookie
Boot Sector, little trackers,
Resident, windows that rootkits and
Macro Viruses may not be key- loggers
and File closed. are a few
Infector are examples of
some examples Spyware.
of viruses.
S.N A S.No B C
o
122
CHAPTER 6 Web Development CHAPTER# 06
123
b. The location of the server (www.google.com)
vi. Search Engine:
A Search Engine is a web-based tool that enables a user to locate
information on the web.
Example: Most popular search engines are Google, Yahoo, and
Bing.
vii. Home Page:
A home page (also known as landing page) is a web page that
serves as the starting point of the website.
viii. Web Hosting:
Web Hosting is a service that allows a web developer to make a
website publicly accessible through the internet.
ix. Web Server:
A web server is the computer that is responsible for serving a
website and all of its content including text and media to a user.
124
A business website is the best way for any organization to market
their products and services. It also tells about the teams, policies
and procedures of that business.
For instance:
www.psx.com.pk is the website of Pakistan Stock Exchange.
vii. Blogs:
A blog is a special type of website that is composed of articles and
posts. These articles are organized into categories and sorted by
the time when they were published.
Example: Word press is a popular blog site.
viii. Forums:
A forum is an online place where different users can discuss any
topic. These topics can be categorized so that users can easily
locate topics of their interest.
ix. Entertainment:
An entertainment website serves content like videos or games
purely for the purpose of entertainment.
Example: YouTube is widely used for entertainment.
x. Social:
Social website is a platform where different people get together and
socialize with each other. They can also share their ideas, opinions
and media.
Example: Facebook and Twitter are instances of social networking
websites.
Q5: What are the various steps involved in creating a web page?
Ans: Requirements:
125
Creating a simple web page using HTML is very easy. It requires:
● A text editor
● A file with .html extension
● A web browser to view that page.
Steps Involved in Creating Web Page in HTML:
Step 1: Text Editor (e.g. Notepad):
● Start by simply creating a new blank file in a text editor of your
choice.
● A simple text editor like notepad can be used to start coding HTML
for a web page.
Example Explained:
● The <html> element is the root element of an HTML page.
● The <head> element contains Meta information about the HTML page.
● The <title> element specifies a title for the HTML page (which is
shown in the browser's title bar or in the page's tab).
● The <body> element defines the document's body, and is a container
for all the visible contents, such as headings, paragraphs, images,
hyperlinks, tables, lists, etc.
Step 3: Save HTML Page:
● Go to the File menu and click on Save.
126
● Make sure to provide a .html or .html extension for the file being
saved.
● This will save the document as a web page instead of a plain text file.
127
Step 4: View HTML Page in Browser:
● Open the saved HTML file in your default web browser.
● The web browser will automatically translate HTML codes to correctly
display the web page.
Simple Tag:
<tag-name>content</tag-name>
Explanation:
● The above syntaxes show:
● The structure of opening a tag
● Defining attribute values
● Placing content inside the element represented by that tag and its
closing structure.
128
Q7: Identify and explain HTML tags used for designing and formatting of the
content?
Ans: HTML Tags for Designing and Formatting of the Content:
Some HTML tags introduce content directly into the web page while others
enhance the design and format of that content.
Some most commonly used HTML tags which change the looks of the web
page are:
TAG DESCRIPTION
<DOCTYPE ● It specifies the HTML version used so the web browsers
html> can show the web page according to HTML standards.
● All HTML documents must start with this tag.
<html> ● All HTML starts with <html> tag & ends with </html>
tag.
<head> ● It is used to define additional information about web
pages.
● It contains a set of tags such as <title>, <meta>,
<style>, <script> etc.
<body> ● The main content of the web page is contained
between <body> & </body>
129
<hr> ● It draws a horizontal line where it is defined.
● It is used to differentiate between sections of the page.
Headings:
TAG DESCRIPTION
<h1> - ● It is used to define six levels of HTML headings (h1,
<h6> h2, h3, h4, h5, h6) with <h1> being heaviest heading
& <h6> being the lightest heading.
Text Formatting:
TAG DESCRIPTION
<b>, <i>, ● These tags are used to bold, italicize & underline text
<u> respectively.
<pre> ● It is used to define a preformatted text.
● The web browser displays such texts with spaces & line
breaks as defined in HTML codes.
<font> ● It is used to define the font, size & color of its text.
● This tag can be composed with three attributes: size,
color & face.
● This tag is supported till version 4.1 of HTML.
<center> ● It is used to align its text to the horizontal web page.
● This tag is supported till version 4.1 of HTML.
<sub> ● It defines subscript text which is under the baseline of
other text & has a smaller size.
● E.g. H2O
<sup> ● It defines superscript text which is slightly above the
normal line of other text & has a smaller size.
● E.g. E=mc2
Example:
130
Output:
Q8: Define Html lists? How many types of lists can be created?
Ans: HTML Lists:
● HTML lists allow web developers to group a set of related items in lists.
● Lists are very useful in displaying point by point information such as:
to-do list
● List of ingredients for a recipe
● List of categories, etc.
Types of Lists in HTML:
HTML provides three different types of list elements namely:
i. Unordered Lists
ii. Ordered Lists
iii. Description Lists and there is another list name as
131
iv. Nested List (list inside list)
i. Unordered List:
● An unordered list is a list of related items in which the order
of items is irrelevant.
● It is defined by <ul> tag and each of its list items is defined
by <li> tag.
● The web browser will display these list items as bullet points.
132
iii. Description List:
● Description lists are used to display different terms and their
descriptions just like in a dictionary or glossary.
● It is defined by <dl> tag and each of its list items is
composed of two elements: term and description.
● Term is defined by <dt> tag and its description is defined by
<dd> tag.
● In description lists, a term can have one or more descriptions
and a description can have one or more terms.
133
iv. Nested Lists:
● HTML lists can be nested i.e. list inside list. Such lists are
called nested lists.
● A very powerful feature of HTML lists is their ability to nest
one into another.
● Any of the list types can contain any other list type as its list
item.
● It is defined by placing the new list tag inside the <<li> tag
of the previous list.
● Web browsers automatically indent nested lists and assign
appropriate markers to those nested list items as well.
134
Q9: How are images displayed in an HTML page?
Ans: Image:
● Images give a visual appeal to the websites.
● Sometimes images can present a better understanding than long
and uninteresting texts. Inserting Images in an HTML Page:
● Images can be inserted in an HTML document by using <img> tag.
● This does not create a copy of the image. Instead, it only creates a
reference to the original image placed somewhere in the computer's
storage.
● The <img> tag is an empty tag which means that it does not
require a closing </img> tag.
● It contains five attributes out of which two are required and three
are optional.
135
Q10: How can the background colour change in HTML?
Ans: Backgrounds:
Backgrounds also give a visual appeal to the websites.
The web browsers display an HTML document with white background by
default. However, this can easily be changed to a different color or even an
image with the help of color and background attributes of the <body> tag.
Background Attributes:
Bg color:
● This attribute is used to change the color of the entire web page.
● Its color value can be defined as RGB code, hexadecimal code or by
color name.
● For instance, to set the background color of the web page to green we
can use any one of these values: rgb(0,255,0): #00FF00: green
● e.g. <body bg color="green">
136
Background:
● This attribute is used to display an image as the background of the
web page.
● Its value will be the reference or URL of the background image.
● e.g. <body background="image.jpg">
(This attribute is supported till version 4.1 of HTML).
137
Frame
name:
Q12: Define the term table and differentiate between rows and columns?
Also describe formatting features and attributes of tables?
Ans: TABLES:
● Tables allow displaying the content (like text, image, and links) in the
form of rows and columns.
● The coordinating place of a row with a column is called a cell.
● These cells contain some content of the webpage.
● In HTML, a table is defined by <table> tag.
ROWS AND COLUMNS:
Rows:
● A row is the collection of all horizontal cells of a table.
● A table can contain any number of rows.
● All the rows in a table have an equal number of cells.
● It is defined by the <tr> tag which is placed inside the <table> tag.
Columns:
● A column is the collection of all vertical cells of a table.
● A table can contain any number of columns as well.
● It is defined by the <td> tag which is placed inside the <tr> row tag.
FORMATTING FEATURES OF TABLE:
Table Heading:
● The HTML table allows defining a header for the columns of our table.
● A header cell is defined by <th> tag and is placed inside a <tr> row
tag.
● It is used to differentiate from the content placed inside normal <td>
data cells.
● To make the entire header row stand out from the rest of the table
contents, define <th> tags for all columns of the first <tr> row tag of
any <table> tag.
Table Data:
The content is placed inside a cell in a table by using <td> table data tag. A
cell can contain any type of data such as text, image, media, link, etc.
Table of Attributes:
Attribute Value Description
Align Left: Specifies the alignment of a table according
Center: to surrounding text.
Right
138
Width Pixels: Specifies the width of a table.
%
Border 1 or 0 Enables or Disable the border around the
table.
Cell padding Pixels Specifies the space between the edge of the
cell & the content inside.
Cell spacing Pixels Specifies the space between cells.
139
140
Q13: Define a frame and framesets? Also describe their attributes in HTML?
Ans: FRAMES:
● HTML frames are powerful elements which allow displaying the
contents of another HTML document within a web page.
● A web page can be divided into multiple sections and each section can
display all contents from a different web page by using frames.
● It is defined by <frame> tag.
● The src attribute is used to provide the reference URL of another web
page to be displayed in this frame.
Attribute of Frame:
Attribute Value Description
src URL Defines the URL of the page which should be
displayed in the frame.
Margin Pixels Defines top & bottom spaces of a frame.
height
Margin width Pixels Defines left & right spaces of a frame.
no resize No resize Defines if the user can change the frame size
or not.
scrolling Yes: Defines if the scroll bar should be displayed
No: in the frame.
Auto
HTML frames and framesets are supported till version 4.1 of HTML
FRAMESETS:
● Framesets define how a web page is divided into rows and columns to
display multiple frames on that web page.
● It is defined by <frameset> tag and contains one or more <frame>
tags.
Attribute of Frameset:
Attribute Value Description
Cols Pixels: Defines the number & the size of frame
% columns.
Rows Pixels: Defines the number & the size of frame rows.
%
141
Q14: List out some popular text editor and other different tools which help in
designing and development of websites?
Ans: Web Designing Tools:
Following is the list of some of the tools that help in designing and
developing a website:
● Microsoft FrontPage
● Corel Draw
● Adobe Dreamweaver
● Word press
● Microsoft Visual Studio
● Wix
● Figma
● Coffee Cup HTML Editor
● Adobe XD
142
Web Development
CHAPTER# 06
143
7. To create a clickable text which navigates to another page or section, we
use:
(a) <input> tag
(b) <li> tag
(c) <b> tag
(d) <a> tag ✔
8. To differentiate the heading cells from rest of the data in a table, we use:
(a) <th> tag ✔
(b) <tr> tag
(c) <td> tag
(d) <dt> tag
9. The tag used to define the title caption of the web browser is:
(a) <head>
(b) <thead>
(c) <title> ✔
(d) <h1>
10. The attribute used to define the URL for reference of image in <img>
tag is:
(a) target
(b) name
(c) src ✔
(d) href
144
B. Respond to the Following:
1. Differentiate Between Web Hosting & Web Server.
Ans: Differentiate Between Web Hosting & Web Server:
146
Example:
The following example displays "Wikipedia website" inside an iframe in
the current document.
147
3 <ul> <ol> c Organize information in rows & iii-b
<dl> columns
4 <tables> d Contains additional information & iv-c
styling features of the webpage.
5 <img> e Business website v-f
6 Hyperlinks f Add images & info graphics to the vi-a
webpage.
148
A database is playing a leading role to enhance the efficiency and
performance of any organization. The goal of the database is to minimize the
loss and increase the productivity and efficiency of any organization in the
age of information technology.
Q6: Describe database management system and name some popular DBMs.
Ans: Database Management System (DBMS):
Databases are usually developed, maintained and controlled by the Database
Management System (DBMS). The DBMS essentially serves as an interface
between databases and end users or application programs, ensuring that
data is consistently organized and remains easily accessible.
149
Examples:
Here are some examples of popular DBMSs used these days:
● MySQL
● Oracle
● Microsoft SQL Server
● MongoDB
● Visual FoxPro
● IBM Db2
● PostgreSQL
Q7: Why is Database Management System preferred over Flat File System?
Ans: Advantages of Database Management System over the Flat File
System:
1. Multiple users can access DBMS and can view, add, edit and delete
records.
2. A DBMS offers tools like Queues, Views and Forms which help users to
manipulate data easily and more efficiently.
3. A DBMS is more secure and reliable.
150
4. DBMS allows distribution of data in multiple tables by making use of
features like keys and relationships between fields of those tables.
5. This allows lesser duplication of data and results in lesser redundancy.
6. Preparing backups and providing limited permissions to the features of
DBMS.
7. DBMS can handle large and complex data more conveniently.
Therefore, it is preferred by medium and large organizations.
151
false
Date & Stores data & time in specified format. 01-01-2020
Time 11:30
Different DBMA Offer different range of data types t Examples 145, -35,
74586 5.6, 3.14, 554.9 A, B, c, d Pakistan Computer, @admin 1,0 stored.
For example, MS Access allows a range of whole numbers from -32768 to
32767 for an "Integer". In modem DBMS, choosing proper Na blots of om
sure that database runs faster
v. View:
In a database the data is stored in tables. However, we can see
that data through views. Views do not store data and just show the
information virtually. They have the ability to fetch data from
different tables. Views maintain the security of data and ensure that
no changes occur in the original data.
Q10: Why is it important to carefully decide the data type for each field?
Ans: A data type determines the type of data that can be stored in a
database table column. When we create a table, we must decide on the
data type to be used for the column definitions. We can also use data
types to define variables and store procedure input and output
parameters. We must select a data type for each column or variable
appropriate for the data stored in that column or variable. In addition, we
must consider storage requirements and choose data types that allow for
efficient storage.
Choosing the right data types for our tables, stored procedures, and
variables not only improves performance by ensuring a correct execution
plan, but it also improves data integrity by ensuring that the correct data
is stored within a database. The data types of the fields determine what
kinds of values we can store in them. If a field should only store a whole
number, declaring it as an INTEGER
prevents us (or a buggy piece of software) from writing some arbitrary
nonsensical string into it, for example. The data types of the fields also
affect what operators and functions we can apply to them in queries. For
example, we can take a substring of a string or convert a string to UPPER
CASE, but we can't do either of those with a number. On the other hand,
we can do arithmetic with numbers (add them, multiply them, etc.),
calculate the average, and so on. The data type is also important when
we ask the database to sort our result set. If we sort by a numeric
column, it will sort numerically (smallest numbers first, or largest first if
we specify that it should sort descending). If we sort by a string column,
it will sort 'asciibetical' (character by character, with numbers coming
before letters, like "apple", "banana", "carrot"; this can give us surprising
152
and usually unhelpful results for strings containing numbers since "9"
sorts after "152", because '1'<'9').
Q11: Describe the steps for creating a table using design view in MS Access.
Ans: Steps for creating a table using Design View:
1. To create tables in Access using "Design View," click on the Create tab
and click on the Table icon. Then pull down the
View menu and choose Design View.
2. A new table then appears in the Table Design
View. Note that the default name assigned to the
table is Table 1.
3. Type the name of a field into the "Field Name"
column.
4. Then Use the drop-down menu in the "Data
Type" column to assign the field a data type.
5. If desired, type a description of the data stored in this field.
6. Repeat steps 4 and 5 until we have created all of the necessary table
fields. An example of a Table may be the Customer Table that has the
following entries.
Q12: Write down the steps for creating a query of view using Design view in
MS Access.
Ans: Steps for creating a query of view using Design View:
i. To make a query in the design view, click on the "Create" tab in the
Ribbon and pull down the "Queries" group and click on the "Query
Design" button.
ii. In the "Show Table" dialog box, add the table or tables that you want
to add to the query design view. Next, add the fields from these tables
that we want to view in our query results or view. If we want to add all
153
of the fields of a table into our result set, we can click and drag the
first field in the table, shown as an asterisk.
iii. Once we have added all the necessary tables and fields to the query
view, click the "Close" button in the "Show Table" dialog box to or
close it and display the query design view.
iv. To run a query and view the result set, we can click the. "Run" button
in the "Results" group of the "Design" tab and the "Query Tools"
contextual tab on the office Ribbon.
v. The result set looks like a table. This result set is a defection of data
from the selected fields of the tables. It is also known as a view.
vi. Click the "Save" button in the Quick Access toolbar. Type a name for
our view and click "OK" to save the query.
Q13: What is the difference between Design View and Datasheet View?
Ans: Difference between Design View & Datasheet View:
154
to create or change the table, form, shows the data in the database. It
or other database object, and also allows us to enter and edit the
configure the fields data. It does not let us change the
format of the database, other than
minor changes (such as column
widths)
155
In this type of relationship, one or more records of one entity are
connected to one or more records of another entity. Usually, a third
entity known as a "junction table" is used to create the many-to-
many relationship between two related entities.
156
It helps to further refine table structures and minimize redundant data. As
we establish a relationship between a pair of tables, we will inevitably make
minor modifications to the table structures. These refinements will make the
structures more efficient and minimize any redundant data that the tables
may contain.
It is the mechanism that enables us to draw data from multiple tables
simultaneously.
A properly defined relationship ensures relationship-level integrity, which
guarantees that the relationship itself is reliable and sound
157
Students table is used to store personal information of individual students. It
has an Id field set as Primary Key. It also has a Class-Id field to set up a
One-to-One foreign key relationship with the Class table.
Class table is used to store information about classrooms in a school. It has
an Id field set as a Primary Key. A student can be enrolled in only one class;
hence, the Students table has a One-to-One relationship with the Class
table. However, many teachers can be associated with many classes. This
requires a Many-to-Many relationship between Class and Teachers tables.
Teachers table is used to store personal information about a teacher. It has
an Id field set as a Primary Key. Many classes can be taught by many
teachers. This requires a Many-to-Many relationship between Teachers and
Class tables.
Teachers Class table is used as a junction table to facilitate the Many-to-
Many relationship between Teacher and Class tables. It also contains an Id
field set as Primary Key. The other two fields are used to define which
teachers are associated with which classes. It creates a One-to-Many
relationship with each of the two connected tables. Teachers and Class
tables use their Teachers Class Id field's foreign key relationship to fetch the
related information from this table.
158
Q22: Describe the components of the ER diagram.
Ans: Components of ER Diagram:
ER Design is made up of different components like attributes, relationships,
etc. There are defined symbols and shapes to represent each one of them.
Some of the shapes used to define these components are:
159
Q24: Discuss the importance of ERD in business.
Ans:
i. Entity relationship diagramming is functional as a method of better
visualizing data. Every manager of a multinational enterprise knows
that spreadsheets are pretty much useless when it comes to
understanding the overall picture of their entity's operations and
how they are structured in relation to each other. This is because
human beings do not generally learn and process by mere letters
and numbers nearly two-thirds of all human beings learn and
memorize visually, through seeing the information presented in an
accessible form.
Visually ERD takes advantage of the basic learning strategy that's
programmed into our minds by extending the programming into
compatible and digestible visualizations of the relationships making
up our entity. Software applications that diagram entity
relationships are meant to make those relationships come to life on
the screen (and in our mind), thus making them much easier to
understand.
ii. It's only with ERD software that senior management, board and
stockholders will be able to assess the whole business and to plot a
viable strategy. Basically, an ERD's function is to bring all of that
data stored in our servers to life so we can make sense of it.
An ERD tells a story about our entity's current state. Stories are
how we learn the best, so it's also an essential part of how we
analyze events and plan for the future. So diagramming should not
only show what the current state of affairs is, but it should also
show the potential ways structures and organizations within an
entity can be altered and the potential effects of these changes. For
groups that operate with hundreds or thousands of interconnected
entities on a multinational scale, we can see how, without
visualization, nothing would make sense.
160
Introduction to Database System CHAPTER# 07
161
6. A field that stores the names of students should be defined as:
(a) Integer
(b) Float
(c) String ✔
(d) Boolean
7. A key that allows only unique entries in a field is called:
(a) Primary Key ✔
(b) Secondary Key
(c) Foreign Key
(d) Super Key
162
B. Respond the Following:
163
This type of relationship defines that a record in one entity can be
connected to only one record in another entity. This is not a very
common type of relationship because the data from related entities
can directly be placed in a single entity. However, this type of
relationship is used to divide larger ones.
Example:
Student table is used to store personal information cities into smaller
individual students. It has an Id field and a Class Id field to set up a
One-to-One relationship between student and class table.
One to Many Relationship:
This type of relationship defines that a record in one entity can be
connected to many records in another entity. This is the most common
type of relationship used in relational databases. This relationship can
also be seen as a Many to One Relationship.
Example:
Teachers and Tea relationship. class tables use to creates a One-to-
Many
Many to Many Relationship:
In this type of relationship, one or more records of one entity are
connected to one or more records of another entity. Usually, a third
entity known as a "junction table" is used to create the many-to- many
relationship between two related entities.
Example:
Many teachers can be associated with many classes. This requires a
Many- to-Many relationship between Class and Teachers tables.
164
i. Entities are in rectangular boxes:
(a) Company
(b) Advertisement
(c) Candidate
(d) Interview
ii. Relationships are in Diamond Shape:
(a) Releases = Company releases Advertisement
(b) Applies for = Candidate applies for company (job), Candidates
applies
for advertisement
(c) Faces = Candidate faces interview
(d) Takes = company takes interview
S.No A S.No. B C
.
i. Primary Key a. Attributes i-b
ii. Integer data b. Always unique value in ii-d
field
iii. Relationship c. Data in plain text form iii-c
iv. Field d. Number without decimal iv-a
point
v. View e. Connection between two v-f
tables
vi. Flat File System f. Shows virtual data vi-c
vii. Entity g. Table with its own vii-
attributes g
165